CPE151
Across
- 1. It is a dedicated device that have been transformed into shared devices.
- 5. The subprocesses can run concurrently on different sites.
- 6. It is time to move disk arm to desired cylinder and time for desired sector to rotate under the disk head.
- 7. It is a network type that is point-to-point connections over long haul lines.
- 8. Several sites may want to transmit information over a link simultaneously.
- 11. It can be used to acquire IP addresses.
- 12. It a synchronized attempts to deny service to authorized users by causing a computer to perform repeated unproductive task.
- 14. It is an access control verification module that works well for systems with few files & few users.
- 16. It specifies how multiple users are to access a shared file simultaneously.
- 17. It uses preset policies to determine which process will get a device and for how long.
- 18. It is a group of related records that contains information used by specific application programs to generate reports.
- 19. intrusion It is any breach of security or modification of data that was not the results of a planned intrusion.
Down
- 2. It directory structure that have shared subdirectories and files.
- 3. It is similar to password but protects a single file.
- 4. A short name seen in directory listings and selected by user when files is created.
- 9. It is a full duplex communication channel between a user-level process and a data device in UNIX system V and beyond.
- 10. It is a collection of nodes containing information about all files.
- 11. It is used to avoid programmed I/O for large data movement.
- 13. It is a technique used to save space in files.
- 15. A site determines whether another message is currently being transmitted over that link.